Reborn Tech Maniac
Chapter 641 Computer Antivirus Software Appears
Chapter 641 Computer Antivirus Software Appears
……
Since the late 1970s, Wall Street has begun to use computer systems to assist its daily transactions, which has undoubtedly greatly improved efficiency.
After the U.S. economy fell to the bottom in 1982, it ushered in a period of high-speed growth in 1983, which in turn promoted the prosperity of the capital market and increasingly demonstrated the convenience brought by computers.
However, with the expansion of the scope of use and the deepening of the degree of dependence, it is more and more necessary to build a unified platform, and this has led to a new wave of large orders.
For this delicious piece of cake, various companies have tried their best, hoping that the fewer competitors, the better.
Coincidentally, Pacific Telecom, a star company, made a mistake and was taken advantage of by hackers. The suppliers of the new information solutions it adopted were Fangyuan and Zheru.
This was simply a God-given opportunity. Several established companies that felt deeply threatened immediately and tacitly launched an attack together, thereby belittling the standards of Fangyuan and Zheru, and finally kicked the challenger out of the game as they wished.
In fact, the key point of the debate here is very simple, that is, the value of "data".Its importance is like a hard disk that has failed. For the precious data inside, users are often willing to pay a lot higher than the price of the hard disk hardware itself to save it.
For the same reason, this order places more emphasis on data security.In particular, because the system was installed earlier, its data also needs to be migrated to the new system. The situation is almost exactly the same as that of Pacific Telecom.
Therefore, people have reason to believe that the data leak of Pacific Telecom shows that the solutions provided by Fangyuan and Zheru still have a distance from the products of those established companies, and it is only natural that they will be eliminated.
Although there are 1 people who are not convinced, Fangyuan and Zheru can only admit it, this is the rule of the game.
Tang Huan appeased the bidding team, gave them a paid vacation, and sent them back to San Francisco.
Seeing that Tang Huan didn't seem to care much about this failure, the female shipping queen Christina couldn't help but be curious, "My dear, this order is not small, and its significance is extraordinary. Do you really not care about the value of it?"
"The matter has come to this, what if we don't accept it?" Tang Huan smiled playfully, "Perhaps this is also God's will. When there is a problem with this big system, we can not only watch the excitement relaxedly, but also be able to enjoy it without any worries. Hands up and down with scruples."
Christina didn't seem to understand, so she continued according to her own thinking: "But you should always pay attention to the media's noise, especially the nonsense from the old enemy "New York Post"."
After she finished complaining, the female shipping queen specially found a newspaper and pointed it out to Tang Huan.
"You women's thinking really confuses me. You know that other people's newspapers have bad things to say, and you still send money to the other party to buy it to make yourself angry." Tang Huan shook his head helplessly.
It can be said that in the cynicism of the "New York Post", there is a soaring sourness, and it started to draw the topic from the hit "Phantom of the Tomb: Eight Diagrams".
"It can be seen from this movie that in Eastern philosophy, there are many opposite concepts like yin and yang, so that our richest man was also deeply influenced when he named his company—Zhe Confucianism represents '0' and '1', and Fangyuan represents 'sky circle' and 'place'."
"I just don't know, Mr. Richest Man, has he ever thought about another set of pairwise concepts—victory and defeat?"
Tang Huan couldn't help laughing after browsing through it, "To discuss philosophy with me, let me tell you what is meant by 'Tian Xingjian, a gentleman strives for self-improvement; Geography Kun, a gentleman carries things with virtue', a process of success and How to plan for the six stages of 'Don't use the dragon, see the dragon in the field, work hard all day long, or jump in the deep, fly the dragon in the sky, and regret the dragon'."
He picked up a pen to write an article, and then published it under a pseudonym. Of course, he was not idle and arguing with the "New York Post" needlessly.Since everyone is so well versed in the way of hype and profit, then brother also take a ride and discuss the profound humanistic heritage of the East.
At first, people thought that this article that appeared in the New York Post’s rival in the city, the New York Daily News, was written by a literary figure in the pro-Tang faction. Unexpectedly, the editor-in-chief of the New York Daily News It is implicitly pointed out that this is the richest man who has personally gone to the front line.
Now the "New York Post" is getting excited, such a rare opportunity to hand over soldiers, just to humiliate the upstarts in Silicon Valley, so they mobilize their leaders and start a scolding war.
It is conceivable that these two newspapers, which were originally taking the route of civilians and producing "sensational news", immediately attracted a large number of onlookers, the social attention soared, and the sales of newspapers increased accordingly.
Tang Huan just quoted scriptures from the "Book of Changes" and gossip in the column opened for him by the "New York Daily News", expounding on the way of a gentleman to improve his personal cultivation, as well as his attitude towards success or failure, and laughed and cursed To tease the opponent's ignorance, as a result, "Phantom of the Tomb: Eight Arrays" stayed in American theaters for another two weeks, and the self-advocating Western world also brought other Chinese elements besides kung fu that he peddled.
For a while, the topics of Pacific Telecom data security and Wall Street trading system bidding were all put aside, and everyone watched the richest man show off his talents.
Seeing that they were also participants in the scolding war, but most of them went to the old rival "New York Daily News". In order to regain the initiative, the "New York Post" began to digress, counting all kinds of gossip and rumors about Tang Huan, describing his life in Xiangjiang. A big harem has been built, and every year he travels to Asia, which is a place of boundless debauchery.
Not to mention, the rogue method of the "New York Post" has really brought some popularity. After all, the dark psychology about this aspect is something that can only be understood but cannot be expressed in words.
The approach of the Oscars also gave entertainment gossip the confidence to make headlines.What's more, Tang Huan's Hollywood company still performed well in 1985. Both the box office and the awards, he gained a lot, which further consolidated his status as a new generation of entertainment tycoon. Take advantage of the opportunity to play.
The mad dog style of the "New York Post" is essentially a way of checking and balancing power. It is a game rule accumulated in Western society for a long time. Tang Huan can't really care about it. "Playboy" boss Hugh Hefner and His "bunny girl", Bob Guccione, the owner of "The Penthouse", and his "baby" are even more evil than Tang Huan, but people still take it calmly.If you are serious, you will lose. The unique self-deprecation of the United States is to deal with this kind of indisputable situation.
Fortunately, at this time, another news came out, which rescued Tang Huan from the harassment of "the hooligans are not scary, but they are educated".
Rich Skrenta and the hacker with the ID Condor who captured Pacific Telecom's mainframe competed on a Fangyuan server on the campus network of Stanford University. The final result was that Condor took away the files on the server and Complacently put it on America Online BBS to show off.
Although the number at this stage is not absolutely large, the netizens who are completely qualified as veterans were immediately in an uproar about this.You know, Richie Skrenta is from a famous family. After being trained by Tang Huan, he should be regarded as a top technical elite. How could he be defeated so easily by this addicted hacker?
Just like that, the disappointed people yelled: What a shitty protégé of the Son of Heaven, I lost my gold coins; conspiracy theorists questioned: Is there something hidden in it... The various community spaces of AOL suddenly became chaotic A nest of porridge.
At present, cyberspace and real society still belong to two clearly separated worlds, and traditional media may not understand the thinking on the Internet.
Therefore, the "New York Post", which was somewhat unclear, quickly found two "I want" comments from the Internet, adapted them, published them, and pointed the finger at Tang Huan: "Rich Skrenta is not you Is it the proud disciple of yours? But he was still defeated by the hacker who captured Pacific Telecom. It seems that your technical level is really very limited, and it is only natural that you lost orders from Wall Street."
According to the experience of heavyweight sensational news in the past, the "New York Post" doubled the print of this newspaper, and then sent it to the operation network. As a result, as soon as the goods were spread out, a big mouth slammed back—— The FBI disclosed a piece of news at a press conference: "The hacker who illegally invaded the Pacific Telecommunications network and stole user data has been captured. He is Kevin Mitnick who has a criminal record. Facing sufficient evidence, he is very serious about his He confessed to the crime."
Kevin Mitnick is not an unknown person. When he was 15 years old, he successfully cracked the North American Air Defense Command System. As a result, he was arrested when he was only 16 years old, thus becoming the world's No. 1 cyber juvenile delinquent.
In front of such a person with a foothold, it is really not such an unexpected event that Pacific Telecom's mainframe was compromised.
People are more interested in how Kevin Mitnick fell into the hands of the FBI and confessed to all his crimes just over a day after he defeated Richie Skrenta.
Obviously, winning or losing this hacker war is not as simple as it seems on the surface, and there must be something else hidden in it.It's just that they don't know what methods Rich Skrenta, and even the teacher behind him, Tang Huan, used to find the culprit in a haystack.
What’s ridiculous is that the New York Post was in such a hurry that this dynamic situation full of variables could just be mentioned as a “tofu piece”, but you insisted on reporting it in a long and lengthy report, which is now lifting a stone. Smashing myself in the foot - so many unsold newspapers of the current issue have become evidence of stupidity and ignorance.
Of course, the FBI will not give answers to such questions - I caught this guy Kevin Mitnick on my own. If you don't believe it, then go and ask elsewhere!
As a result, various media who refused to give up acted separately, requesting interviews with Pacific Telecom, Fangyuan, Zheru, and even Rich Skrenta himself.
As a result, Pacific Telecom, Fangyuan, and Zheru all kept a low profile, and only issued an official statement: the criminals were arrested, and people are very happy. In the future, we will carry out system security work more carefully to prevent such accidents from happening.
If we say that big companies such as Pacific Telecom, Fangyuan, and Zheru are mature and prudent, it is justifiable, but the indifference of Naqi Skrenta is intriguing and arousing.
You know, such a young man who is still in college is at the stage of full-bloodedness and youthful vigor, how could he be indifferent to the failure record of losing to Kevin Mitnick?
Rich Skrenta, who was hiding on the university campus, was overwhelmed by the disturbance, and simply became a product salesman, introducing a new achievement in the field of computer security recently launched by Zheru - an anti-virus engine, which is used to resist the initial attack. A flood of computer viruses.
As early as 1949, in a lecture at the University of Illinois, John von Neumann described a theoretical model of how a computer program could copy itself, which was essentially the prototype of a computer virus with this basic feature.
As computers have evolved from mainframes to minicomputers, and then to the era of microcomputers represented by personal computers, computers have gradually stepped down from the altar, resources have become abundant, and the opportunities for ordinary people to come into contact with computers have also increased exponentially. Computer viruses Research results in the academic field are also becoming more and more fruitful.
When personal computers became popular all over the world in the 1980s, computer viruses finally left the laboratory and made waves in reality.For example, just in January this year, an emerging virus appeared that used the boot sector of the disk as its habitat.
Zheru did not personally dabble in the field of computer antivirus software, but authorized a series of related technologies including antivirus engines to Symantec to launch specific products.
Since the scanning operation of computer anti-virus software consumes a lot of resources and is unbearable for today's personal computers, it borrows the implementation principle of "Hanka" and leaves part of the work to the hardware - the computer virus protection card, which is almost invisible. This eliminates the possibility of such software being pirated.
Rich Skrenta is one of the protagonists of this hacker war. Although the result of the competition was negative, after Kevin Mitnick was arrested strangely and quickly, his lost prestige was instantly restored. Avoid talking about the inside story, and then add a mysterious halo.
The reporters finally managed to corner him and get him to speak, but they no longer cared about what the other party said specifically. Anyway, publishing it would satisfy the public's curiosity.
As a result, Symantec's anti-virus software had not yet been officially released, so it took advantage of the series of turmoil caused by the data leak of Pacific Telecom to place a big free advertisement, which led to a flood of inquiries from all walks of life.
However, this is just the beginning, and more new technologies will be revealed later.
(End of this chapter)
……
Since the late 1970s, Wall Street has begun to use computer systems to assist its daily transactions, which has undoubtedly greatly improved efficiency.
After the U.S. economy fell to the bottom in 1982, it ushered in a period of high-speed growth in 1983, which in turn promoted the prosperity of the capital market and increasingly demonstrated the convenience brought by computers.
However, with the expansion of the scope of use and the deepening of the degree of dependence, it is more and more necessary to build a unified platform, and this has led to a new wave of large orders.
For this delicious piece of cake, various companies have tried their best, hoping that the fewer competitors, the better.
Coincidentally, Pacific Telecom, a star company, made a mistake and was taken advantage of by hackers. The suppliers of the new information solutions it adopted were Fangyuan and Zheru.
This was simply a God-given opportunity. Several established companies that felt deeply threatened immediately and tacitly launched an attack together, thereby belittling the standards of Fangyuan and Zheru, and finally kicked the challenger out of the game as they wished.
In fact, the key point of the debate here is very simple, that is, the value of "data".Its importance is like a hard disk that has failed. For the precious data inside, users are often willing to pay a lot higher than the price of the hard disk hardware itself to save it.
For the same reason, this order places more emphasis on data security.In particular, because the system was installed earlier, its data also needs to be migrated to the new system. The situation is almost exactly the same as that of Pacific Telecom.
Therefore, people have reason to believe that the data leak of Pacific Telecom shows that the solutions provided by Fangyuan and Zheru still have a distance from the products of those established companies, and it is only natural that they will be eliminated.
Although there are 1 people who are not convinced, Fangyuan and Zheru can only admit it, this is the rule of the game.
Tang Huan appeased the bidding team, gave them a paid vacation, and sent them back to San Francisco.
Seeing that Tang Huan didn't seem to care much about this failure, the female shipping queen Christina couldn't help but be curious, "My dear, this order is not small, and its significance is extraordinary. Do you really not care about the value of it?"
"The matter has come to this, what if we don't accept it?" Tang Huan smiled playfully, "Perhaps this is also God's will. When there is a problem with this big system, we can not only watch the excitement relaxedly, but also be able to enjoy it without any worries. Hands up and down with scruples."
Christina didn't seem to understand, so she continued according to her own thinking: "But you should always pay attention to the media's noise, especially the nonsense from the old enemy "New York Post"."
After she finished complaining, the female shipping queen specially found a newspaper and pointed it out to Tang Huan.
"You women's thinking really confuses me. You know that other people's newspapers have bad things to say, and you still send money to the other party to buy it to make yourself angry." Tang Huan shook his head helplessly.
It can be said that in the cynicism of the "New York Post", there is a soaring sourness, and it started to draw the topic from the hit "Phantom of the Tomb: Eight Diagrams".
"It can be seen from this movie that in Eastern philosophy, there are many opposite concepts like yin and yang, so that our richest man was also deeply influenced when he named his company—Zhe Confucianism represents '0' and '1', and Fangyuan represents 'sky circle' and 'place'."
"I just don't know, Mr. Richest Man, has he ever thought about another set of pairwise concepts—victory and defeat?"
Tang Huan couldn't help laughing after browsing through it, "To discuss philosophy with me, let me tell you what is meant by 'Tian Xingjian, a gentleman strives for self-improvement; Geography Kun, a gentleman carries things with virtue', a process of success and How to plan for the six stages of 'Don't use the dragon, see the dragon in the field, work hard all day long, or jump in the deep, fly the dragon in the sky, and regret the dragon'."
He picked up a pen to write an article, and then published it under a pseudonym. Of course, he was not idle and arguing with the "New York Post" needlessly.Since everyone is so well versed in the way of hype and profit, then brother also take a ride and discuss the profound humanistic heritage of the East.
At first, people thought that this article that appeared in the New York Post’s rival in the city, the New York Daily News, was written by a literary figure in the pro-Tang faction. Unexpectedly, the editor-in-chief of the New York Daily News It is implicitly pointed out that this is the richest man who has personally gone to the front line.
Now the "New York Post" is getting excited, such a rare opportunity to hand over soldiers, just to humiliate the upstarts in Silicon Valley, so they mobilize their leaders and start a scolding war.
It is conceivable that these two newspapers, which were originally taking the route of civilians and producing "sensational news", immediately attracted a large number of onlookers, the social attention soared, and the sales of newspapers increased accordingly.
Tang Huan just quoted scriptures from the "Book of Changes" and gossip in the column opened for him by the "New York Daily News", expounding on the way of a gentleman to improve his personal cultivation, as well as his attitude towards success or failure, and laughed and cursed To tease the opponent's ignorance, as a result, "Phantom of the Tomb: Eight Arrays" stayed in American theaters for another two weeks, and the self-advocating Western world also brought other Chinese elements besides kung fu that he peddled.
For a while, the topics of Pacific Telecom data security and Wall Street trading system bidding were all put aside, and everyone watched the richest man show off his talents.
Seeing that they were also participants in the scolding war, but most of them went to the old rival "New York Daily News". In order to regain the initiative, the "New York Post" began to digress, counting all kinds of gossip and rumors about Tang Huan, describing his life in Xiangjiang. A big harem has been built, and every year he travels to Asia, which is a place of boundless debauchery.
Not to mention, the rogue method of the "New York Post" has really brought some popularity. After all, the dark psychology about this aspect is something that can only be understood but cannot be expressed in words.
The approach of the Oscars also gave entertainment gossip the confidence to make headlines.What's more, Tang Huan's Hollywood company still performed well in 1985. Both the box office and the awards, he gained a lot, which further consolidated his status as a new generation of entertainment tycoon. Take advantage of the opportunity to play.
The mad dog style of the "New York Post" is essentially a way of checking and balancing power. It is a game rule accumulated in Western society for a long time. Tang Huan can't really care about it. "Playboy" boss Hugh Hefner and His "bunny girl", Bob Guccione, the owner of "The Penthouse", and his "baby" are even more evil than Tang Huan, but people still take it calmly.If you are serious, you will lose. The unique self-deprecation of the United States is to deal with this kind of indisputable situation.
Fortunately, at this time, another news came out, which rescued Tang Huan from the harassment of "the hooligans are not scary, but they are educated".
Rich Skrenta and the hacker with the ID Condor who captured Pacific Telecom's mainframe competed on a Fangyuan server on the campus network of Stanford University. The final result was that Condor took away the files on the server and Complacently put it on America Online BBS to show off.
Although the number at this stage is not absolutely large, the netizens who are completely qualified as veterans were immediately in an uproar about this.You know, Richie Skrenta is from a famous family. After being trained by Tang Huan, he should be regarded as a top technical elite. How could he be defeated so easily by this addicted hacker?
Just like that, the disappointed people yelled: What a shitty protégé of the Son of Heaven, I lost my gold coins; conspiracy theorists questioned: Is there something hidden in it... The various community spaces of AOL suddenly became chaotic A nest of porridge.
At present, cyberspace and real society still belong to two clearly separated worlds, and traditional media may not understand the thinking on the Internet.
Therefore, the "New York Post", which was somewhat unclear, quickly found two "I want" comments from the Internet, adapted them, published them, and pointed the finger at Tang Huan: "Rich Skrenta is not you Is it the proud disciple of yours? But he was still defeated by the hacker who captured Pacific Telecom. It seems that your technical level is really very limited, and it is only natural that you lost orders from Wall Street."
According to the experience of heavyweight sensational news in the past, the "New York Post" doubled the print of this newspaper, and then sent it to the operation network. As a result, as soon as the goods were spread out, a big mouth slammed back—— The FBI disclosed a piece of news at a press conference: "The hacker who illegally invaded the Pacific Telecommunications network and stole user data has been captured. He is Kevin Mitnick who has a criminal record. Facing sufficient evidence, he is very serious about his He confessed to the crime."
Kevin Mitnick is not an unknown person. When he was 15 years old, he successfully cracked the North American Air Defense Command System. As a result, he was arrested when he was only 16 years old, thus becoming the world's No. 1 cyber juvenile delinquent.
In front of such a person with a foothold, it is really not such an unexpected event that Pacific Telecom's mainframe was compromised.
People are more interested in how Kevin Mitnick fell into the hands of the FBI and confessed to all his crimes just over a day after he defeated Richie Skrenta.
Obviously, winning or losing this hacker war is not as simple as it seems on the surface, and there must be something else hidden in it.It's just that they don't know what methods Rich Skrenta, and even the teacher behind him, Tang Huan, used to find the culprit in a haystack.
What’s ridiculous is that the New York Post was in such a hurry that this dynamic situation full of variables could just be mentioned as a “tofu piece”, but you insisted on reporting it in a long and lengthy report, which is now lifting a stone. Smashing myself in the foot - so many unsold newspapers of the current issue have become evidence of stupidity and ignorance.
Of course, the FBI will not give answers to such questions - I caught this guy Kevin Mitnick on my own. If you don't believe it, then go and ask elsewhere!
As a result, various media who refused to give up acted separately, requesting interviews with Pacific Telecom, Fangyuan, Zheru, and even Rich Skrenta himself.
As a result, Pacific Telecom, Fangyuan, and Zheru all kept a low profile, and only issued an official statement: the criminals were arrested, and people are very happy. In the future, we will carry out system security work more carefully to prevent such accidents from happening.
If we say that big companies such as Pacific Telecom, Fangyuan, and Zheru are mature and prudent, it is justifiable, but the indifference of Naqi Skrenta is intriguing and arousing.
You know, such a young man who is still in college is at the stage of full-bloodedness and youthful vigor, how could he be indifferent to the failure record of losing to Kevin Mitnick?
Rich Skrenta, who was hiding on the university campus, was overwhelmed by the disturbance, and simply became a product salesman, introducing a new achievement in the field of computer security recently launched by Zheru - an anti-virus engine, which is used to resist the initial attack. A flood of computer viruses.
As early as 1949, in a lecture at the University of Illinois, John von Neumann described a theoretical model of how a computer program could copy itself, which was essentially the prototype of a computer virus with this basic feature.
As computers have evolved from mainframes to minicomputers, and then to the era of microcomputers represented by personal computers, computers have gradually stepped down from the altar, resources have become abundant, and the opportunities for ordinary people to come into contact with computers have also increased exponentially. Computer viruses Research results in the academic field are also becoming more and more fruitful.
When personal computers became popular all over the world in the 1980s, computer viruses finally left the laboratory and made waves in reality.For example, just in January this year, an emerging virus appeared that used the boot sector of the disk as its habitat.
Zheru did not personally dabble in the field of computer antivirus software, but authorized a series of related technologies including antivirus engines to Symantec to launch specific products.
Since the scanning operation of computer anti-virus software consumes a lot of resources and is unbearable for today's personal computers, it borrows the implementation principle of "Hanka" and leaves part of the work to the hardware - the computer virus protection card, which is almost invisible. This eliminates the possibility of such software being pirated.
Rich Skrenta is one of the protagonists of this hacker war. Although the result of the competition was negative, after Kevin Mitnick was arrested strangely and quickly, his lost prestige was instantly restored. Avoid talking about the inside story, and then add a mysterious halo.
The reporters finally managed to corner him and get him to speak, but they no longer cared about what the other party said specifically. Anyway, publishing it would satisfy the public's curiosity.
As a result, Symantec's anti-virus software had not yet been officially released, so it took advantage of the series of turmoil caused by the data leak of Pacific Telecom to place a big free advertisement, which led to a flood of inquiries from all walks of life.
However, this is just the beginning, and more new technologies will be revealed later.
(End of this chapter)
You'll Also Like
-
Chinese Martial Arts: Start as Feng Yuxiu!
Chapter 171 1 hours ago -
I am in Konoha: I have mosquito powers
Chapter 97 1 hours ago -
Zombieland: I Have a Tomb of God
Chapter 222 1 hours ago -
Twenty years after being taken away by mistake, my family wants the fake one instead of me
Chapter 164 1 hours ago -
Ten minutes and no last hits? Is it a fake match or is it just a bad match?
Chapter 259 1 hours ago -
A song of "Yue Lao" was offline, and I became a critical singer
Chapter 54 1 hours ago -
Football: The national football team was expelled and rewarded with a Ronaldo template!
Chapter 48 1 hours ago -
Rebirth of the Hong Kong tycoon, the beginning of the star Shuzhen
Chapter 135 1 hours ago -
Wanjie: 100 ways to check in from Pokémon
Chapter 259 1 hours ago -
NBA: Start with full-level organization
Chapter 196 1 hours ago